HP0-Y45 - Architecting HP Network Solutions
Go back to HP
A network architect is planning a solution for a customer’s campus LAN. The customer has a existing network that consists of three tiers. The new HP switches are being deployed at the access layer, and the existing network infrastructure is using Cisco Per-VLAN Spanning Tree (PVST+) between the access layer and the distribution layer. The customer has listed support for PVST+ as a top requirement for the solution, and the customer network managers are somewhat hostile to the idea of adding HP switches. What should the network architect do?
The network architect should select HP switches that support PVST+ and use intelligent Resilient Framework (IRF) for other benefits
A data center has a traditional three-tier network design with routing at the distribution layer. The customer is virtualizing its servers and adding technologies such as the migration of virtual machines (VMs). How well does this architecture (topology) meet the needs of the customer’s changing environment?
This topology is not ideal in supporting the large layer 2 domain that best fits this customer’s needs.
Virtual Connect Flex-10 technology can divide a single 10GbE port into how many individual network connections?
A network architect needs to schedule a network outage for migrating to a new HP solution. What primarily determines the maximum length for the outage?
Valid maintenance windows for any affected applications
A network architect is planning the access layer for a campus LAN that must support 10,000 edge ports in one large building with four floors. The customer has these preferences and requirements: Theswitches should be fixed-portswitches, which the customer prefers. The switches must allow the customer totransaction to access layer routing. What should the network architect propose?
The network architect should suggest modular switches, which support access layer routing without additional licensing, Fixed-Port switches require an additional license for this feature.
A network architect is designing a solution with HP products. A customer has the following requirements for controlling the management access for administrators: Administrators are assigned privileges when they login based on their identity. Security policies related to password compatibility and password rotation, like the company’s windows domain policies, are enforced for administrator credentials The company can easily resolve the access of administrators who leave the company Administrators have a backdoor into the management interface in case network connectivity fails in any way. Which options meets the company’s requirements?
Authentication to RADIUS server with local authentication as a secondary method.
A physical server has 6 NICs and supports eight virtual machines (VMs). NIC 1 and NIC 2 connect the VMs to the data Center LAN. The two NICs are intended to provide load balancing and redundancy (the other NICs are used for purposes not relevant to this question) VMs 1 through 5 belong to VLAN 10. VMs 6 through 8 belong to VLAN 20. What is a proper way to set up the switch or virtual switches?
Virtual switch 1 supports VLAN 10, maps to NIC 1, and maps to VMs 1 through 5. Virtual switch 2 supports VLAN 20, maps to NIC 2, and maps to VMs 6 through 8.
What distinguishes user acceptance tests (UATs) from validation tests?
UATs tests applications as they are used by real users, while validation tests check specific functionality.
A physical server connects to two Fibre Channel (FC) switches. The server supports eight virtual machines (VMs) with VMware version 5.1. The VMs need to be zoned and given access to remote storage on an individual basis. Which feature must the network architect ask the SAN administrators to enable FC ports?
N-port ID Virtualization (NPIV)
A network architect is designing a redundancy solution for a customer and has learned that there is a simple link between two critical components. During the past 4000 hours of operation, the link has failed twice. The customer estimates that each failure has taken two hours to resolve. Given the information, what is the availability that this link provides?
Less that 99.99%
A network architect is designing a Fibre Channel (FC) SAN solution for a company. The network architect needs the number of inter-switch links (ISLs) between FC switches relative to the number of connections to the servers. Which statement correctly describes the consideration for this decision? (Select two)
When the FC Fabric implements more zones, the FC switches require relatively more ISLs.
When the SAN includes multiple FC over Ethernet (FCoE) hops, the FC switches require relatively more ISLs.
Which description best characterizes current trends in deploying services for an enterprise solution?
Companies are connecting multiple sites together but distributing services to each site to increase resiliency and responsiveness.
A customer needs a storage solution that uses the current IP network and delivers data to serves in the manner of a file server. Which family of solution meets this need?
HP P6000 Enterprise Virtual Array (EVA) disk arrays.
A network architect has planned several validation tests and user acceptance tests (UATs) for a new HP solution. In order to ensure meaningful results, what is one step that the network architect should complete before implementing the new solution?
Talk with key stakeholders to determine valid maintenance windows for the UATs.
A network architect is planning a guest solution for a group of ports in a conference room. Guests should have access to the internet only. The company wants a single solution prefers not to burden visitors with login requests. Which solution would best meet the company’s requirements for guest network?
Place the guest ports in a VLAN that is allowed access only to the internet. Optionally configure port isolation.
A network architect is working with a customer to design an 802.1X authentication solution for wired and wireless users. The customer has a Microsoft Windows domain. For RADIUS server, the customer is choosing between the User Authentication Manager (UAM) plug-in for HP Intelligent Management Center (IMC) and Microsoft Network Policy Server (NPS). What is one reason to implement UAM?
UAM is required for integrating with the HP MultiService Mobility (MSM) products, which support wireless users.
A customer has a solution that continuously backs up date for critical services to a disaster recovery site. The customer requires a one hour recovery point objective (RPO) and a 90 minute recovery time objective (RTO). The network architect is scoping the bandwidth requirements and has used perfmon to analyze the write throughput for the critical service over a month. The results are: Peak throughput= 2000 Mbps Average throughput = 500 Mbps Highest average throughput in hour increments =1000 Mbps High average throughput in 90 minute increments =750 Mbps What is the bandwidth requirement for the continuous backup?
What is the benefit of implementing an HP solution in multisite phases as opposed one phase?
Components of the solution can be tested thoroughly between phases.
A customer has a virtualized data center and these key requirements: The customer can scale any application and easily install new hardware that supports that application. The network supports vMotion for live migration of virtual machines (VMs). Rack servers experience a high load of traffic. Each server has two Gigabit Connections to the data center LAN. These connections need to be established to two different switches, and the rack servers use Link Aggregation Control Protocol (LACP)-based network interface card teaming. Each set of server access layer switches has two 10G connections to the data center core. The network architect is searching for server access layer switches that meet the customer requirements. The customer has suggested an HP switch that is usually recommended for the campus LAN access layer. Why should the network architect suggest a different switch that would better meet the customer requirements?
The need for deep packed buffers
What are information technology service Management (ITSM) frameworks, such as the Infrastructure Technology Infrastructure Library (ITILv3) and The Open Group Architecture Framework (TOGAF)?
They are high level approaches that provide recommendations and best practices for IT design and management.
What is the preferred time for completing the racking and labeling of equipment for a new implementation?
Before the scheduled outage
A customer is beginning to implement IPv6 in conjunction with IPv4 in its private network. The customer has obtained this IPv6 Block: 2003:DBB:1:1000::/52. The network architect is planning IPv6 addresses for these subnets: VLAN 10 with100 users VLAN 20 with 130 users The customer wants to use stateless autoconfiguration to assign IP address to the endpoints. How should the network architect plan the IPv6 subnet address for each VLANs?
The subnet for each VLAN should use a /104 subnet address, such as 2003:DB8:1:1000::100:0/104
A network architect is planning the products that will interconnect a main site campus LAN, Branches, and data center (located at the different site from the main campus). Which customer requirement would cause the network architect to change HP enterprise-class modular routers as opposed to deep-buffer 10G routing switches for this solution?
The need for WAN connections that use T3/E3/J3
A network architect is working with a customer and needs to understand the regulatory compliance, contractual agreements, and service-level agreements (SLAs) that apply to the company. The customer has the general IT roles in the options. Which stakeholder should the network architect ask for information?
Chief Executive Officer (CEO)
Which switch is best suited to act at the edge of a medium to large HP FlexFabric solution?
A customer requires a storage solution that can be backed up to a disaster recovery site, which the source data center reaches over 10G Ethernet connections. The storage solution should also present the remote storage as a virtual disk on the server. Which technology currently meets these needs?
Fibre Channel over Ethernet (FCoE)
An employee takes the company laptop offsite and connects it to an insecure network. A hacker is able to deploy a malware application to the laptop. The employee takes the network back to the office, where the malware uses the credentials of the employee to eavesdrop and to implement denial of service (DoS) attacks. Which security would help prevent this type of attacks?
Port-based security with 802.1X
A network architect is planning an HP MultiService Mobility for a customer. The solution is intended to provide wireless access for employees various branch locations. The solution includes two MSM760 Premium Mobility Controllers, which are deployed at the main office, and 60 MSM 460 Access Points (APs), which are deployed at branches (three at each branch). The network architect is controlling information about the branch routers and firewalls. What is the one reason that the architect needs this information?
To determine whether to add bandwidth to the WAN link because wireless traffic must be tunneled to the controller regardless of its ultimate destination.
A network architect is planning a complete access layer and core upgrade for a customer’s campus LAN. The campus has four large buildings, each requiring between 1000 and 3000 edge ports. Which factor will play a primary role in determining whether the network architect needs to plan a two-tier or three-tier topology for the campus LAN?
The number of fiber links between each building and the building where the core switches reside.
A network architect is designing a Multiple Spanning Tree Protocol (MSTP) solution for a network.The network architect plans to create two MSTP instances for 10 VLANs. The network architect also wants to ensure that the best paths are selected when interoperating with other spanning tree regions. Which guideline aids in this effort?
Calculate the traffic load for each VLAN and then distribute them accordingly between each MSTP instance.
A network architect is working with a customer to plan an 802.1X solution for authenticating employees to a WLAN. The customer has these requirements: The solution is as easyas possible to set up. Users can authenticateto the WLAN using theirWindowsdomain credentials. Computers that are the members of the domain shouldbe able to connectas soon asthey boot up and beforeusers log in. What are the needs of certificates for this solution?
The RADIUS server requires a certificate. The network architect can plan policies for computer and user authentication that do not require certificates.
A hospital CIO tells the network architect that the current network solution is not performing well. The hospital has access layer that supports 48 10/100/1000 Mbps ports and one Gigabit uplink. The hospital is seeking an upgrade to provide better performance and redundancy. The CIO cannot provide the network architect more detailed information about traffic patterns and utilization but does not want the network architect to install Intelligent Management Center (IMC) and analyze the network. The CIO does indicate that these applications are important: Voice over IP(VoIP) Scheduling and building applications Patient data logging Medical imaging The network architect needs to plan appropriate over subscription ration for access layer uplinks. What is one piece of information that the architect should collect for this task?
How much bandwidth the medical imaging applications require.
A network architect is working with a customer to implement a new network design. The network architect has learned that the company has a legacy application hosted on a number of legacy servers. The legacy application must remain intact during and after the new network implementation, as the company plans to continue using it indefinitely. The customer has the standard IT roles. With which stakeholder should the network architect discuss the technical details of the legacy system and any challenges or specifies about maintaining interoperability?
ChiefInformation Officer (CIO) or Vice President (VP)/Director of IT
How does a solution such as HP Secure Virtualized Framework (SVF) meet the specialized needs of a virtualized data center?
It contains the monitoring of traffic that passes between VMs without passing through an external switch.
A network architect is compiling information about the total cost of ownership (TCO) for a proposal. Which factors play a role in TCO?
Cost of upgrading modules for the proposal
A network architect has designed a two-tier topology for the campus LAN and is planning to implement routing at the core. Which requirement might cause the network architect to consider implementing routing at the access layer?
The customer has an HP MultiService Mobility (MSM) solution, and wireless users to roam seamlessly across the site.
Which customer requirement is mostly likely to cause the network architect to search for an HP alliance solution?
An infrastructure Detection System/Infrastructure Prevention System (IDS/IPS) for virtualized environment.
A network architect is planning a BladeSystem solution for a customer. The server blades require connections for these purposes: Connections to the data center LAN Fibre channel (FC)connections Management connection vMotion connections The network architect wants to follow the best practices but also wants to minimize the number of NICs and cables required. Which guidelines should the network architect follow when choosing server blades and interconnect modules?
The server blades can have any type of ports, but the interconnect modules must be FlexFabric or Flex-10 modules.
A customer is seeking an upgrade for their campus LAN network. Currently the customer has access layer switches that support 48 10/100/1000 Mbps ports and one Gigabit uplink. The customer wants performance in the upgrade but also wants to minimize costs. The network architect has used the network Traffic Analyzer (NTA) for intelligent Management Center (IMC) to collect information about the access layer uplinks. These are the results: For switches on Floor1,the peak utilization in 650 Mbps on a Gigabit uplink.On most days, the utilization peaksat about 400 Mbps. Peaks usuallyoccur briefly. Forswitches on Floor 2, thepeak utilizationis 800 Mbpson a Gigabit uplink. During active period, the utilizationoften remains near 800. Which is the most appropriate plan for oversubscription in the new access layer? (For this question, think only about oversubscription and not customer needs for redundancy)
48.1 in all locations